-
New Programming Language, Do we really need ?
We have seen multiple new programming languages every year and question which is commonly asked is Will there always be new programming languages coming out? I believe many new programming languages will keep coming and many are on the way. Technologies are evolving around us will make it fairly easy; everyday big corporation and tech…
-
ipconfig/displaydns
Why does the aboave command prints URLs, Websites addresses that we have never accessed before ? When your system communicates with the DNS server for resolvingthe name queries, Your system builds the cache over the perios of time, This cache normally contains records from the host file and also the retrieved records from the recently…
-
Backend vs Frontend
Why did backend guys always feel superior over frontend guys? I have been on both side and have done both front-end development and back-end development for long time. Truth is in a web based product nothing is superior both complement each other. Think about the product which has sophisticated transaction processing system, better error handling,reliability…
-
Information Security Profile Questions
One of the friend asked this question in one of the popular forums, i thought I should keep copy of my answer in my blog as well.What sort of interview questions can be asked in information security profile?It depends on your role under information security profile, If you are ininformation security engineering role, questions will…
-
Google and Facebook’s Data Center
I think Capacity wise Facebook is the good place to start as no other website has experienced kind of volume and traffic that Facebook has witnessed in the recent past.As you have not specified whether You want to know more about the infrastructure, security or you are interested in their operating model, staff size and…
-
Microservices Architecture, A developer’s Prespective
Microservices architecture addresses many concern of application development but does not solve all the problems. It has its own advantages and limitations. In order to understand it fully, we need to understand one common architecture pattern in practice, i.e. Monolithic Architecture Monolithic architecture are highly tightly coupled and you can’t change something without impacting other.…
-
What is RSASecure ID and How it works
RSA SecureID is in use from long time, I think even before GPS. It uses two factor authentication mechanism. **RSA SecurID**, formerly referred to as **SecurID**, is a mechanism developed by Security Dynamics (later RSA Security and now RSA, The Security Division of EMC (RSA Security)) for performing two-factor authentication (Two-factor authentication) for a user…
-
Cryptocurrencies, what is it ?
Precious metal, exchange of goods have served as currency in the past, as human race advances and their knowledge of market, financial innovations surfaces. This time its about the Cryptographic currencies. You might have heard about Block Chain, Bitcoin, Titcoin, Primecoin etc.. all of them are digital way of exchanging values. These frameworks outlines how…
-
Web Development Technologies, 2016 and Beyond
Its hard to arrive at conclusion in this wide and ever changing job market of IT industry but one thing is quite evident that now data is becoming highly critical and crucial to any business. Most of the recruitment are happening around 1. Dealing with data. (Web service, SOA, API’s etc..) 2. Protecting Data (Protection…
-
Apple Siri’s Architecture
Apple siri has evolved many times and each and every time it has managed to bounce back with solid capabilities, sky is the limit and we can only expect some or other kind of improvement in the architecture as the technology evolves. These guys have not given an inch to rivals. Apple Siri backend runs…